EZINE:
In this week's Computer Weekly, we look back at the UK government's AI Safety Summit and assess what it achieved – and what it didn't. Our latest buyer's guide examines the future of business software and modernising legacy applications. And we find out how the UK PSTI Act aims to protect your smart devices. Read the issue now.
EZINE:
In this week's Computer Weekly, we reveal the 13th annual UKtech50 list, with this year's most influential person award shared by secretaries of state for science, innovation and technology Michelle Donelan and Chloe Smith. Also, we examine mounting legal challenges faced by the emergence of generative AI tools such as ChatGPT. Read the issue now.
ESSENTIAL GUIDE:
This article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space
INFORMATION CENTER:
Visit this information center and find out how smarter technology can result in gains in efficiency, business alignment and risk management strategies.
WHITE PAPER:
In this analysis, Frank Buytendijk examines what information management means, and describes a complete spectrum of business cases, ranging from tactical cost reduction to transformational impact on the organization’s business model.
WHITE PAPER:
This decision guide demonstrates how migrating to Serena Service Manager will help transform your IT organization into an agile, responsive, and business-focused service provider.
WHITE PAPER:
Are you sitting on your data with no plan? Do you know how to capitalize on information you already have? This whitepaper dives into the world of profiting from data. Access now to discover 4 essential steps to getting started, as well as challenges to overcome and a discussion on the importance of data integrity.
WHITE PAPER:
This white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders.
WHITE PAPER:
This paper presents a broad overview of the major types of compliance required today. In addition, it considers an approach to compliance based on the network as a whole, rather than on specific devices or areas.